CA2587618C - Custom static diffie-hellman groups - Google Patents
Custom static diffie-hellman groups Download PDFInfo
- Publication number
- CA2587618C CA2587618C CA2587618A CA2587618A CA2587618C CA 2587618 C CA2587618 C CA 2587618C CA 2587618 A CA2587618 A CA 2587618A CA 2587618 A CA2587618 A CA 2587618A CA 2587618 C CA2587618 C CA 2587618C
- Authority
- CA
- Canada
- Prior art keywords
- prime
- cryptographic unit
- group
- order
- elliptic curve
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7204—Prime number generation or prime number testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IB2004003699 | 2004-11-11 | ||
IBPCT/IB2004/003699 | 2004-11-11 | ||
US62688304P | 2004-11-12 | 2004-11-12 | |
US60/626,883 | 2004-11-12 | ||
PCT/IB2005/003380 WO2006051402A1 (en) | 2004-11-11 | 2005-11-11 | Custom static diffie-hellman groups |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2587618A1 CA2587618A1 (en) | 2006-05-18 |
CA2587618C true CA2587618C (en) | 2016-04-05 |
Family
ID=36336252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2587618A Active CA2587618C (en) | 2004-11-11 | 2005-11-11 | Custom static diffie-hellman groups |
Country Status (6)
Country | Link |
---|---|
US (1) | US8588409B2 (ja) |
EP (1) | EP1815635B9 (ja) |
JP (2) | JP5690465B2 (ja) |
CN (2) | CN101099328B (ja) |
CA (1) | CA2587618C (ja) |
WO (1) | WO2006051402A1 (ja) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8438115B2 (en) * | 2005-09-23 | 2013-05-07 | Pitney Bowes Inc. | Method of securing postage data records in a postage printing device |
JP4688886B2 (ja) * | 2006-01-11 | 2011-05-25 | 三菱電機株式会社 | 楕円曲線暗号パラメータ生成装置及び楕円曲線暗号システム及び楕円曲線暗号パラメータ生成プログラム |
DE102006013515A1 (de) * | 2006-03-23 | 2007-10-04 | Siemens Ag | Kryptographisches Verfahren mit elliptischen Kurven |
JP5328186B2 (ja) * | 2008-03-21 | 2013-10-30 | ルネサスエレクトロニクス株式会社 | データ処理システム及びデータ処理方法 |
US8345879B2 (en) * | 2008-04-25 | 2013-01-01 | International Business Machines Corporation | Securing wireless body sensor networks using physiological data |
US8707042B2 (en) * | 2008-08-28 | 2014-04-22 | Red Hat, Inc. | Sharing keys between cooperating parties |
DE102008061483A1 (de) | 2008-12-10 | 2010-06-24 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zum Verarbeiten von Daten |
KR101166129B1 (ko) * | 2011-05-31 | 2012-07-23 | 서울대학교산학협력단 | 사전계산 테이블을 이용한 이산대수 계산 방법 및 그 장치 |
TWI502947B (zh) * | 2012-04-12 | 2015-10-01 | Jintai Ding | New cryptographic system and method based on mismatching |
JP6571193B2 (ja) * | 2014-08-22 | 2019-09-04 | ノバ サウスイースタン ユニバーシティーNova Southeastern University | クロネッカー積を使用するデータアダプティブ圧縮およびデータ暗号化 |
CN106209739B (zh) * | 2015-05-05 | 2019-06-04 | 科大国盾量子技术股份有限公司 | 云存储方法及系统 |
US10129026B2 (en) | 2016-05-03 | 2018-11-13 | Certicom Corp. | Method and system for cheon resistant static diffie-hellman security |
US10355859B2 (en) * | 2017-03-27 | 2019-07-16 | Certicom Corp. | Method and system for selecting a secure prime for finite field diffie-hellman |
CN108228138B (zh) * | 2017-12-28 | 2021-12-10 | 南京航空航天大学 | 一种sidh中特殊域快速模乘的方法 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5627893A (en) * | 1992-12-22 | 1997-05-06 | Telstra Corporation Limited | Cryptographic method |
ATE246418T1 (de) * | 1997-02-14 | 2003-08-15 | Citibank Na | Aufbau eines zyklotomischen polynoms eines kryptosystems basierend auf dem diskreten logarithmus über endliche körper |
US6252959B1 (en) * | 1997-05-21 | 2001-06-26 | Worcester Polytechnic Institute | Method and system for point multiplication in elliptic curve cryptosystem |
DE69834431T3 (de) | 1998-01-02 | 2009-09-10 | Cryptography Research Inc., San Francisco | Leckresistentes kryptographisches verfahren und vorrichtung |
US6446205B1 (en) * | 1998-12-10 | 2002-09-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
US6778666B1 (en) * | 1999-03-15 | 2004-08-17 | Lg Electronics Inc. | Cryptographic method using construction of elliptic curve cryptosystem |
US7200225B1 (en) * | 1999-11-12 | 2007-04-03 | Richard Schroeppel | Elliptic curve point ambiguity resolution apparatus and method |
US20020055962A1 (en) * | 1999-11-12 | 2002-05-09 | Richard Schroeppel | Automatically solving equations in finite fields |
US7359507B2 (en) * | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US7308469B2 (en) * | 2001-06-15 | 2007-12-11 | Robert Joseph Harley | Method for generating secure elliptic curves using an arithmetic-geometric mean iteration |
GB2384403B (en) * | 2002-01-17 | 2004-04-28 | Toshiba Res Europ Ltd | Data transmission links |
JP2003233306A (ja) * | 2002-02-07 | 2003-08-22 | Nippon Telegr & Teleph Corp <Ntt> | 公開鍵暗号安全性評価方法及び装置及び公開鍵暗号安全性評価プログラム及び公開鍵暗号安全性評価プログラムを格納した記憶媒体 |
-
2005
- 2005-11-11 CN CN200580046419.XA patent/CN101099328B/zh active Active
- 2005-11-11 EP EP05801157.8A patent/EP1815635B9/en active Active
- 2005-11-11 WO PCT/IB2005/003380 patent/WO2006051402A1/en active Application Filing
- 2005-11-11 CA CA2587618A patent/CA2587618C/en active Active
- 2005-11-11 CN CN201110078763.4A patent/CN102170351B/zh active Active
- 2005-11-11 JP JP2007540746A patent/JP5690465B2/ja active Active
- 2005-11-14 US US11/272,150 patent/US8588409B2/en active Active
-
2011
- 2011-10-25 JP JP2011233823A patent/JP2012019559A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
US20070071237A1 (en) | 2007-03-29 |
CN102170351A (zh) | 2011-08-31 |
EP1815635A4 (en) | 2011-06-08 |
CA2587618A1 (en) | 2006-05-18 |
JP2012019559A (ja) | 2012-01-26 |
CN102170351B (zh) | 2014-02-19 |
CN101099328B (zh) | 2011-05-18 |
US8588409B2 (en) | 2013-11-19 |
WO2006051402A1 (en) | 2006-05-18 |
EP1815635A1 (en) | 2007-08-08 |
EP1815635B9 (en) | 2014-01-15 |
EP1815635B1 (en) | 2013-09-25 |
CN101099328A (zh) | 2008-01-02 |
JP2008520144A (ja) | 2008-06-12 |
JP5690465B2 (ja) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2587618C (en) | Custom static diffie-hellman groups | |
Perlner et al. | Quantum resistant public key cryptography: a survey | |
Raymond et al. | Security issues in the Diffie-Hellman key agreement protocol | |
Lei et al. | NTRU-KE: A lattice-based public key exchange protocol | |
US20110200186A1 (en) | Method of cipher block chaining using elliptic curve cryptography | |
Saeki | Elliptic curve cryptosystems | |
EP3430607B1 (en) | Method and system for cheon resistant static diffie-hellman security | |
JP3402441B2 (ja) | 公開鍵暗号化装置、公開鍵暗号復号装置及び復号プログラム記録媒体 | |
CA2742530C (en) | Masking the output of random number generators in key generation protocols | |
Hwang et al. | EPA: An efficient password-based protocol for authenticated key exchange | |
Zhong | An overview of rsa and oaep padding | |
EP3809628B1 (en) | Method and system for selecting a secure prime for finite field diffie-hellman | |
Banerjee et al. | Improved Trial Division Technique for Primality Checking in RSA Algorithm | |
Krhovják | Analysis, demands, and properties of pseudorandom number generators | |
Ikram | Cryptographic identification of users over network | |
Orunsolu et al. | A DISTRIBUTED PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOL USING A HYBRID APPROACH | |
POINTCHEVAL | Number Theory and Public-Key Cryptography | |
Kommera et al. | A Closer look at RSA and ECC | |
Alia | EC and Lattice Key Exchange performance study based Public-Key Cryptographic Protocols | |
De Soete | Public key cryptography | |
Bansal et al. | Some Insightful Attacks on the RSA Cryptosystem | |
Banerjee et al. | Deterministic and Probabilistic Approach in Primality Checking for RSA Algorithm | |
Mathur | Elliptic Curve Cryptography | |
Yang et al. | A new development of public key cryptosystem | |
Kelly | The RSA Algorithm: A Mathematical History of the Ubiquitous Cryptological Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |